api-patterns
Pass
Audited by Gen Agent Trust Hub on Feb 28, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill includes a local utility script 'scripts/api_validator.py' which is intended to be executed on a user-provided project directory for static analysis.
- [PROMPT_INJECTION]: The 'scripts/api_validator.py' script introduces a potential surface for indirect prompt injection due to processing untrusted file content.
- Ingestion points: The validator reads data from files in the target project path, including source code and API specifications.
- Boundary markers: There are no explicit markers or boundary instructions used to differentiate between the script's output and the data read from files.
- Capability inventory: The script has the capability to read files from the local filesystem and is executed via the command line.
- Sanitization: The script performs regex-based scanning of file contents without sanitizing or escaping the data before analysis.
Audit Metadata